- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 626 Articles for Network

Updated on 23-Jan-2020 12:22:45
Sysdig is an open source application, It captures system state and activity from a running Linux instance, then saves, filters and analyzes. It is scriptable in Lua and consists of a command line interface and an effective interactive UI, Sysdig is a combination of strace + tcpdump + htop + iftop + lsof + transaction tracing + awesome sauce. This article explains about -“How To Monitor Your Ubuntu System with Sysdig”.Installing SysdigConfigure the apt repository with trusted Draios GPG key as shown below –# curl -s https://s3.amazonaws.com/download.draios.com/DRAIOS-GPG-KEY.public | apt-key add - # curl -s -o /etc/apt/sources.list.d/draios.list http://download.draios.com/stable/deb/draios.listTo update the package ... Read More 
Updated on 23-Jan-2020 11:40:33
The recent WannaCry ransomware attack is so massive that it has affected more than 2, 00, 000 machines across 150 countries around the globe. There are individuals, various institutions and government agencies who became victims of this cyber extortion. Now all of them are desperately looking for a solution to retrieve their locked data. They may not want to pay the demanded ransom amount, but if they will not able to find a suitable solution then, may end up paying the ransom to the blackmailers.While paying the ransom amount, there is no guaranty that whether you will get back your ... Read More 
Updated on 23-Jan-2020 11:05:17
Cacti is a Network monitoring device that creates personalized graphs of server efficiency. It is accessed and managed via an online entrance-finish. This article explains on – How to install and set up cacti on Ubuntu.PrerequisitesLAMPSNMP, SNMPD and RRDtoolsTo install LAMP, add the following repository as shown below –$ sudo add-apt-repository 'deb http://archive.ubuntu.com/ubuntu trusty universe'To update the packages, using the following command –$ sudo apt-get updateTo install LAMP, use the following command –$ sudo apt-get install apache2 mysql-server-5.6 php libapache2-mod-phpThe sample output should be like this –Reading package lists... Done Building dependency tree Reading state information... Done libapache2-mod-php is already ... Read More 
Updated on 23-Jan-2020 10:42:00
We are amazed at the revolution of technology which brought us by the awesome concept called- Internet of Things (IOT). With the help of intelligent technology, we are able to transform our ordinary home to smart home and control it just by giving the command from a device without physically operating them. There are smart watches that not only track all our physical activities but also alert us when the stats cross the limits.But, on the technology front, things are moving faster so as our needs to get more comfort with the help of technology. That is why now the ... Read More 
Updated on 23-Jan-2020 10:40:23
In this article, we will learn – How to install and configure the Sysdiag tool. Sysdiag is an open-source activity monitoring tool which can be used to capture and analyze application logs which have powerful filtering features with customizable outputs.Sysdig works from getting the information from the kernel which allows capturing system calls and the information which comes to the kernel. It also monitors the servers which are installed on the system.Pre-requisitesTo complete this demo we need the following requirements − film John Wick − Chapter 2 online.Ubuntu 16.04 installed on the machineA non-root user with Sudo permission of the ... Read More 
Updated on 23-Jan-2020 07:47:45
In this article we will learn about – how to configure and setup UFW ( Firewall) on Ubuntu 16.04, UFW stands for Uncomplicated Firewall which acts as an interface to IPTABLES that simplifies the process of the configuration of firewalls it will be a very hard for a beginners to learns and configure the firewall rules where we will secure the network from unknown users are machines. UFW works on the policies we configure as rules.Pre-requisitesFor this, we needed a non-root user with root permission on the machine.Installing the UFW (Firewall)UFW is installed by default with Ubuntu, if not installed ... Read More 
Updated on 23-Jan-2020 07:34:09
In this article, we will learn about how to configure SFTP without enabling the shell access on Ubuntu 14.04, SSH File Transfer Protocol (SFTP) which is a secure way to transfer files from various a servers are to a server using the SSH encrypted connections, which is a different protocol from File Transfer Protocol (FTP) which is supported by all the FTP clients.Protocol (SFTP) is a secure way to transfer files from various servers to a server using the SSH encrypted connections, which is a different protocol from File Transfer Protocol (FTP) that is supported by all the FTP clients.SFTP ... Read More 
Updated on 23-Jan-2020 05:50:52
Iptables and ip6tables are used to established, maintain, and check up on the tables of IPv4 and IPv6 packet filter ideas in the Linux kernel. Several distinct tables may be defined. Each table contains a quantity of constructed-in chains and may also contain person-outlined chains. Let us explore about how to manage a system firewall using Iptables in Linux.Installing IP tablesTo install IP tables, use the following command –$sudo apt-get install iptablesThe sample output should be like this –Reading package lists... Done Building dependency tree Reading state information... Done The following packages were automatically installed and are no longer required: ... Read More 
Updated on 20-Jan-2020 11:53:18
In this article, we will allow you to configure a password-less login for Linux system with SSH keys to connect to a remote Linux server without entering a password which will also increase the trust between two Linux servers for easy file transfer.SSH is an open source and trusted network protocol that is used to login into remote servers for executing of commands and programs. This is also used to transfer files from one computer to another computer over the network using secure copy (SCP).Creating SSH Keys# ssh-keygen -t rsa Generating public/private rsa key pair. Enter file in which to ... Read More 
Updated on 17-Jan-2020 11:24:36
As the saying goes – A man must be big enough to admit his mistakes, smart enough to profit from them, and strong enough to correct them. In IT world too mistakes are commonly done by new comers in the field due to inexperience. The Unix world is no different from the rest, and system admins unknowingly tend to commit some avoidable errors in their early days in the beginning of their career. Here are a few mistakes which are made by new system admins or users while working at UNIX prompt.This article explains the 10 most common Linux mistakes.userdel ... Read More Advertisements